Jump to content

Can't open Malwarebytes website because of malware

Go to solution Solved by Purgi,

Recommended Posts


I downloaded and ran an exe file from torrent and now my computer is full of malware. I can't open Malwarebytes website to download Malwarebytes anti-malware software. 


Thanks for your help in advance! 

Link to post
Share on other sites
Hello Purgi and welcome to Malwarebytes,

Run the following:

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status...
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"

  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.

Thank you,



Link to post
Share on other sites

Hiya Purgi,

Thanks for those logs, continue:

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.

NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1: This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed.

The following directories are emptied:
  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Flash Player cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.


Download Malwarebytes version 4 from the following link:


Double click on the installer and follow the prompts.

When the install completes do the following:

Open Malwarebytes, select > "settings" > "protection tab"

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Go back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes quarantine any found entries...

To get the log from Malwarebytes do the following:
  • Click on the Detection History tab > from main interface.
  • Then click on "History" that will open to a historical list
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
  • Right-click on AdwCleaner.exe and select Run as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Download "Microsoft's Safety Scanner" and save direct to the desktop

Ensure to get the correct version for your system....


Right click on the Tool, select Run as Administrator the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and Click Finish when the scan is done.

Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\msert.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....

Let me see those logs in your next reply....

Thank you,



Link to post
Share on other sites


-Log Details-
Scan Date: 9/19/20
Scan Time: 11:41 PM
Log File: d489ac34-fac0-11ea-a56f-002481610c88.json

-Software Information-
Components Version: 1.0.1045
Update Package Version: 1.0.30105
License: Free

-System Information-
OS: Windows 7 Service Pack 1
CPU: x86
File System: NTFS
User: AnaTro\u00c5\u00a1elj-PC\Ana Tro\u00c5\u00a1elj

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 177592
Threats Detected: 27
Threats Quarantined: 27
Time Elapsed: 9 min, 40 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 11
Trojan.FakeTool.E, HKU\S-1-5-21-764943377-1814856723-589023453-1000\SOFTWARE\DreamTrips, Quarantined, 3112, 701670, 1.0.30105, , ame, , , 
Trojan.Glupteba.E, HKU\S-1-5-21-764943377-1814856723-589023453-1000\SOFTWARE\MICROSOFT\cf70e02f, Quarantined, 505, 821174, 1.0.30105, , ame, , , 
Trojan.Glupteba.E, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{715AA892-4B92-447E-8859-D7BCAA54ED5D}, Quarantined, 505, 781231, 1.0.30105, , ame, , , 
Adware.ICLoader, HKLM\SOFTWARE\MICROSOFT\bestavicampaign563, Quarantined, 533, 584322, 1.0.30105, , ame, , , 
Adware.ICLoader, HKLM\SOFTWARE\MICROSOFT\campaign9961, Quarantined, 533, 518478, 1.0.30105, , ame, , , 
Adware.ICLoader, HKLM\SOFTWARE\MICROSOFT\multitimercampaign84170, Quarantined, 533, 518476, 1.0.30105, , ame, , , 
Adware.ICLoader, HKLM\SOFTWARE\MICROSOFT\Speedycar, Quarantined, 533, 518473, 1.0.30105, , ame, , , 
Adware.ICLoader, HKLM\SOFTWARE\MICROSOFT\TechnologyDesktopnew, Quarantined, 533, 518479, 1.0.30105, , ame, , , 

Registry Value: 3
Trojan.Glupteba.E, HKU\S-1-5-21-764943377-1814856723-589023453-1000\SOFTWARE\MICROSOFT\cf70e02f|CAMPAIGNID, Quarantined, 505, 821174, 1.0.30105, , ame, , , 
Trojan.Glupteba.E, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{715AA892-4B92-447E-8859-D7BCAA54ED5D}|PATH, Quarantined, 505, 781231, 1.0.30105, , ame, , , 
PUM.Optional.DisableMRT, HKLM\SOFTWARE\POLICIES\MICROSOFT\MRT|DONTOFFERTHROUGHWUAU, Quarantined, 6901, 676880, 1.0.30105, , ame, , , 

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 2
RiskWare.KMS, C:\WINDOWS\SYSTEM32\TASKS\R@1N-KMS, Quarantined, 3718, 820459, 1.0.30105, , ame, , , 
RiskWare.BitCoinMiner, C:\USERS\ANA TROšELJ\APPDATA\LOCAL\TEMP\WUP, Quarantined, 875, 512161, 1.0.30105, CC9E64F89567CD09EDC9CBCE, dds, , , 

File: 11
RiskWare.KMS, C:\Windows\System32\Tasks\R@1n-KMS\Office16ProPlus, Quarantined, 3718, 820459, , , , , 3E192B50A554535E7F7AFF0E6BA1C423, 3DAF23DF42F965D2B93DD23F42A36A0802EAFDC572D76D54879C475E6A2694CA
Trojan.Agent, C:\WINDOWS\WINDEFENDER.EXE, Quarantined, 502, 455564, 1.0.30105, , ame, , 6512AE7C9F36206F6433F78296102419, 6B9468EFEE35A8454A7FB395F43E5BDD14DF918437661846D7D6EC199BA08883
Trojan.Glupteba.E, C:\WINDOWS\SYSTEM32\DRIVERS\WINMONPROCESSMONITOR.SYS, Quarantined, 505, 781208, 1.0.30105, , ame, , 622FD523A87CB55BE0B676A70C64E8F8, F609C6656A0C451DAFA5173DF0CD848F7CB7F22C4F150F8D16716C12593DE66C
RiskWare.BitCoinMiner, C:\USERS\ANA TROšELJ\APPDATA\LOCAL\TEMP\WUP\WUP.EXE, Quarantined, 875, 512161, 1.0.30105, CC9E64F89567CD09EDC9CBCE, dds, 00904085, BD4B03E6127A34ECAB890F6EB1546634, 52C8CFF981E5D541E4B2930A4A5E0B0A495D62C8237E91538D94C03A048DD51D
Trojan.Agent, C:\WINDOWS\SYSTEM32\DRIVERS\WINMON.SYS, Quarantined, 502, 482874, 1.0.30105, 85B39800F40AF891C5C5DF51, dds, 00904085, 4EF0C39E632279D7B3672D2EFC071E5B, 889FB266C4C01BB4EF67635249C8DAEB641FC86CE62FC280B34BEEC415FB6129
Generic.Malware/Suspicious, C:\USERS\ANA TROšELJ\APPDATA\LOCAL\TEMP\CSRSS\COLLECTCHROMEFINGERPRINT.EXE, Quarantined, 0, 392686, 1.0.30105, , shuriken, , C07A4F2C1ED89B5044EAE1D832F49FC7, 5A3ED5641F881089FA932992BBB36343E2BEA21B97F7C20342E4524309BEA6D7
Trojan.Agent, C:\WINDOWS\SYSTEM32\DRIVERS\WINMONFS.SYS, Quarantined, 502, 482876, 1.0.30105, E7169B36C3D028EB05942AA0, dds, 00904085, 0D3A8D67CD969C6E096B4D29E910DD9E, EB0BE2AC3833C843214A55B14C31125A7B600D5272BDF322C4871F42627576E4
Trojan.Glupteba, C:\USERS\ANA TROšELJ\APPDATA\LOCAL\TEMP\CSRSS\C1F4A4BA3E84.EXE, Quarantined, 4327, 811783, 1.0.30105, , ame, , 390C89FC7F86289D2D45D0D22B3B4421, C3FF718F4F4529B2877F3AB7B2EFC43523E08403595412C536338AD2DF67D6B2
Trojan.BitCoinMiner, C:\USERS\ANA TROšELJ\APPDATA\LOCAL\TEMP\CSRSS\WUP\XARCH\WUP.EXE, Quarantined, 926, 836712, 1.0.30105, 678C43BA100E9B28A227D861, dds, 00904085, 332B8A65879C20F09582FE7CE166F20A, 3F610B6155EB9D57251AC5D995BCB93634A5E8FB9FE0F7695A8ED561C0D37E1F
Spyware.PasswordStealer.GO, C:\USERS\ANA TROšELJ\APPDATA\LOCAL\TEMP\CSRSS\U20200626.EXE, Quarantined, 9655, 835370, 1.0.30105, , ame, , C6E81BAC5A3385A0A9CEF0BF9B45C624, 3414DDDA2D8E2D44F7E33CF513DE0C6A10D593E0358AD55586657D42682FFB5C
Trojan.Ranumbot, C:\USERS\ANA TROšELJ\APPDATA\LOCAL\TEMP\CSRSS\W20200508.EXE, Quarantined, 8233, 819921, 1.0.30105, 80FFC50A2E0CA2698626A167, dds, 00904085, 62DC2B5D62C2C08650CFCA322FC2CCCF, BE7B484F78BF36A09F7FE040F7F523FA1AF63757BD23813ABFB2C307A9E73CEF

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


Link to post
Share on other sites

# -------------------------------
# Malwarebytes AdwCleaner
# -------------------------------
# Build:    07-22-2020
# Database: 2020-07-20.1 (Local)
# Support: https://www.malwarebytes.com/support
# -------------------------------
# Mode: Clean
# -------------------------------
# Start:    09-20-2020
# Duration: 00:00:03
# OS:       Windows 7 Ultimate
# Cleaned:  14
# Failed:   0

***** [ Services ] *****

No malicious services cleaned.

***** [ Folders ] *****

Deleted       C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Lavasoft\WebCompanion

***** [ Files ] *****

No malicious files cleaned.

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

No malicious tasks cleaned.

***** [ Registry ] *****

Deleted       HKCU\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\free.fromdoctopdf.com
Deleted       HKCU\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\fromdoctopdf.com
Deleted       HKCU\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\fromdoctopdf.dl.myway.com
Deleted       HKCU\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\fromdoctopdf.dl.tb.ask.com
Deleted       HKCU\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\myway.com
Deleted       HKCU\Software\Lavasoft\Web Companion
Deleted       HKCU\Software\Microsoft\Internet Explorer\DOMStorage\ak.staticimgfarm.com
Deleted       HKCU\Software\Microsoft\Internet Explorer\DOMStorage\staticimgfarm.com
Deleted       HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
Deleted       HKLM\Software\Lavasoft\Web Companion
Deleted       HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{13E374E4-E610-4F9E-ACC4-E461DA17D869}_is1
Deleted       HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
Deleted       HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries cleaned.

***** [ Chromium URLs ] *****

No malicious Chromium URLs cleaned.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries cleaned.

***** [ Firefox URLs ] *****

No malicious Firefox URLs cleaned.

***** [ Hosts File Entries ] *****

No malicious hosts file entries cleaned.

***** [ Preinstalled Software ] *****

No Preinstalled Software cleaned.


[+] Delete Tracing Keys
[+] Reset Winsock


AdwCleaner[S00].txt - [2876 octets] - [20/09/2020 00:04:13]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C00].txt ##########

Link to post
Share on other sites


Microsoft Safety Scanner v1.0, (build 1.323.1504.0)
Started On Sun Sep 20 00:10:07 2020

Extended Scan Results
->Scan ERROR: resource process://pid:1072,ProcessStart:132450267358144321 (code 0x00000005 (5))
->Scan ERROR: resource file://C:\hiberfil.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\hiberfil.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\hiberfil.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{5c585aaf-e95a-11ea-b2ca-002481610c88}{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{688990dd-fa9e-11ea-b5d3-002481610c88}{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{688990de-fa9e-11ea-b5d3-002481610c88}{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{763f8de3-ea7f-11ea-b087-002481610c88}{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{77cc06a3-fabd-11ea-b303-002481610c88}{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{77cc06a4-fabd-11ea-b303-002481610c88}{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))
->Scan ERROR: resource file://C:\System Volume Information\{d19527ee-e7c5-11ea-ae83-00059a3c7a00}{3808876b-c176-4e48-b7ae-04046e6cc752} (code 0x00000021 (33))


Microsoft Safety Scanner v1.0, (build 1.323.1504.0)
Started On Sun Sep 20 09:03:38 2020
->Scan ERROR: resource process://pid:1188,ProcessStart:132450508160447175 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:300,ProcessStart:132450590218596315 (code 0x0000012B (299))
->Scan ERROR: resource file://C:\hiberfil.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\hiberfil.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000021 (33))

Quick Scan Results for A6F9A5C7-BE68-48DC-BEF7-23A9569D75C6:

Results Summary:
No infection found.
Microsoft Safety Scanner Finished On Sun Sep 20 09:11:46 2020

Return code: 0 (0x0)

Link to post
Share on other sites

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection

Thank you



Link to post
Share on other sites
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.